Architectural Solutions

Workshop ID: ARCHITvD8Q

Objective

Securing ICS infrastructure involves building the systems architecture to be secure from the ground up ‘defense in depth.’ The attacker may pass one roadblock, only to be faced by another and another.
By employing next-generation firewall, antivirus, intrusion detection, and prevention capabilities,  the security teams can build the best defense to stop cyberattacks.

Depending on the nature of the business, the management needs to consider the risk associated with the underlying system infrastructure and use of the next-gen solutions, including Machine Learning (ML), Artificial Intelligence (AI), and behavioral analysis to increase prevention, efficacy, and speed.

    Price: $1 $74.99
    Add to Cart For Corporate Request Demo →
    • Category: Free Workshop
    • Duration: 9 Mins
    • CPE: 1 HR
    • Workshop Type: e-Learning

    What you will learn:


      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      Securing ICS Infrastructure - Defense in Depth
      Next-Gen Tools and Techniques
      Zero Trust

    Advanced Persistent Threat or Intrusion

    • Course ID: ADVANCp6H2
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:


    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Advanced Persistent Threat
    Phases of an Advanced Persistent Threat
    Reconnaissance and Initial Access
    Expand Access
    Data Capture/Exfiltration or Manipulation
    Track-Covering and Exit
    The suggested e-Learning courses that would reduce the insurance cost

    Anti Money Laundering (AML) Awareness

    • Course ID: CO00103
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What it is and how does it work?
    • Why people and organizations launder money?
    • How money laundering works: basic process
    • Legal consequences for money laundering, including state and federal (U.S.) penalties
    • Applicable laws and regulation
    • Insider trading

    Architectural Solutions

    • Course ID: ARCHITvD8Q
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:


    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Securing ICS Infrastructure - Defense in Depth
    Next-Gen Tools and Techniques
    Zero Trust

    Asset Management

    • Course ID: FCOO102
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What you will learn:
      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is Asset Management?
      Asset Management and Cybersecurity
      Recommendations for Asset Management
      Case Study - Application/Program Vulnerabilities 

    Backup and Recovery

    • Course ID: FCOO104
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What you will learn:
      The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is a disaster?
      What is Disaster Recovery?
      Backup and Recovery
      Protecting Backup Data

    Breach Management

    • Course ID: FCOO105
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    What you will learn:

     

    The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:

    • What is the importance of abreach notification?
    • What is a data breach?
    • In what circumstances wouldnotification of a data breach be required and to whom?
    • Suggested e-Learning courses toenhance the knowledge.

    (Note - The suggested e-Learningprogram is a two-part series.)

    Breach Notification Part I - Awareness

    • Course ID: CS00301
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What is the importance of a breach notification?
    • What is a data breach?
    • In what circumstances would notification of a data breach be required and to whom?
    • When and how should notification of a data breach be provided?
    • Framework for Effective Data Breach Notification Legislation
    • Timing of Notification to Affected Individuals
    • Post Data Breach Immediate Action Items
    • Breach Notification to Authorities

    Breach Notification Part II - Advanced

    • Course ID: CS00302
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • Breach Management
    • Effective Breach Response
    • Data Breach Checklist
    • Breach Notification Notice Content
    • Notification Timelines
    • Lifecycle of a Data Breach
    • Public Relations Strategy

    Bring Your Own Device

    • Course ID: FCOO106
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    1. What you will learn:
      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is Bring Your Own Device (BYOD)?
      What are the BYOD challenges?
      How can you secure your BYOD environment?
      Examples of BYOD device hack
      Suggested e-Learning courses to enhance the knowledge
      (Note - The suggested e-Learning program is a two-part series.)

    Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

    • Course ID: DR00101
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • Disaster
    • Business Continuity and Disaster Recovery
    • Use Cases
    • Risks Covered by DR
    • Driving Factors
    • Challenges in Developing DR Plan
    • Technical Challenges
    • Key Factors in DR Plan
    Need us to design a course for you? Contact Now
    Copyrights © 2020 All Rights Reserved by SecuRetain.